SlideShare une entreprise Scribd logo
1  sur  46
Copyright © 2014 Splunk Inc.
Virtual Gov Day
Bert Hayes
Solutions Engineer
Splunk
Agenda
1:00pm – Welcome & Keynote Presentation
Bert Hayes, Splunk
Alan Webber, IDC Government Insights
2:00pm – Splunk for Government: Customer Use Cases
Splunk Overview: Bert Hayes, Splunk
Security Use Case: Chris Letterman, State of Alaska
Business Analytics Use Case: Justin Boucher, DoD Healthcare
3:00pm – Concurrent Breakout Sessions
Splunk for Security
Glenn Keavney, Deloitte
Bert Hayes, Splunk
Splunk for IT Operations
Jennifer Green, Los Alamos National Security, LLC.
Jon Rooney, Splunk
Splunk for Application Delivery
Calvin Smith, Northrop Grumman Information Systems
Jon Thompson, Splunk
2
Finding Balance And Security
In A Big Data World
Alan Webber
Research Director
Government Insights
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 4
Data Has Been
Around For A Long Time
 Bronze Age – Used Cuneiform
to record laws and
transactions (Hammurabi
Code)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 5
Data Has Been
Around For A Long Time
 Bronze Age – Used Cuneiform to
record laws and transactions
(Hammurabi Code)
 Paper records
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 6
Data Has Been
Around For A Long Time
 Bronze Age – Used Cuneiform to
record laws and transactions
(Hammurabi Code)
 Paper records
 Electronic records and now
big data
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 7
Where We Came From
Falling Off The Tech
Cliff
Reestablishing A
Foundation
Going Forward
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 8
Where We Came From
 Paper Records
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 9
Where We Came From
 Paper Records
 Machine Based Records
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 10
Where We Came From
 Paper Records
 Machine Based Records
 PC and Computer Era
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 11
Where We Came From
 Paper Records
 Machine Based Records
 PC and Computer Era
 Still Very Mixed
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 12
Where We Came From
Falling Off The Tech
Cliff
Reestablishing A
Foundation
Going Forward
1st Platform – Mainframe And Terminals
13
 Switching from paper to electrons
 Still large question about efficiency
and effectiveness of electronic
business processes
 However paper doesn’t go away
 Establishment of the role of the CIO
2nd Platform – LAN/Internet And Client-
Server
14
 Institutionalization of networks and
the introduction of the Internet in
work processes
 Client-Servers began the
exponential growth curve in data
 Beginning of enterprise
transformation
3rd Platform – Taking Advantage Of
Connectedness
15
 Citizen/consumer transformation
pushes enterprise transformation
 New platforms
 New engagement models for
Government
 New decision makers
 Government continues focus on
operational efficiency
 New Government focus on
• Outcomes versus outputs
• Innovation
Innovation Accelerators Driving
Disruption And More Change
16
 Innovation
accelerators will
accelerate the rate of
change in enterprises
 All of these will affect
government, though
IoT, Cognitive
Systems, and Next
Gen Security will be
the big ones
CIO’s Are Being Overwhelmed With
Data
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 17
 CIO’s are often unprepared
CIO’s Are Being Overwhelmed With
Data
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 18
 CIO’s are often unprepared.
 Multiple types of records
 Paper
 Digital
 Machine data
Source: IDC Global Technology and Industry Research Organization IT Survey, May 2013 N= 182
Q. What type of data are being captured and analyzed in your organization?
Data, Data Everywhere
 Sources – Internal v. External
 Type – Structured v. Unstructured
 Issues
 Quality
 Security
Government Data Does Not Support
Optimal Decisionmaking
20
To what extent do you agree with the following characteristics of the data
available in your organization ? (Respondents Selecting “Agree” or Completely Agree”)
N = 98
Source: IDC's 2013 BIG Data Survey - March 2014
0
10
20
30
40
50
60
70
80
Secure Actionable Timely Trusted Clean Complete Granular
(%)
CIO’s Are Being Overwhelmed With
Data
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 21
 CIO’s are often unprepared and lack
necessary resources
 Multiple types of records
 Paper
 Digital
 Machine data
 Trend will only continue and will
grow
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 22
Where We Came From
Falling Off The Tech
Cliff
Reestablishing A
Foundation
Going Forward
Image used under a Creative Commons Attribution License from Flickr at
https://www.flickr.com/photos/grongar/4483840743/
Operational Intelligence is a type of real-time and
dynamic business analytics that is designed to deliver
visibility and insight into streaming data, events, and
business operations allowing CIO’s and other executives
to make decisions and speed actions based upon real-
time insights and intelligence.
Operational Intelligence Definition
Operational Intelligence Stack
Decision Support
& Automation Interface
Analytics &
Discovery
Data Organization
& Management
Data Sources
The foundation of the stack includes all current
and potential data sources
Refers to software that processes and prepares
all types of data for analysis. This layer extracts,
cleanses, normalizes, tags, and integrates data.
This layer includes software for ad-hoc
discovery, and deep analytics and software that
supports real-time analysis and automated,
rules-based transactional decision making.
Applications with functionality required to
support collaboration, scenario evaluation,
risk management, and decision capture
and retention
Operational Intelligence Stack
Decision Support
& Automation Interface
Analytics &
Discovery
Data Organization
& Management
Data Sources
The foundation of the stack includes all current
and potential data sources
Refers to software that processes and prepares
all types of data for analysis. This layer extracts,
cleanses, normalizes, tags, and integrates data.
This layer includes software for ad-hoc
discovery, and deep analytics and software that
supports real-time analysis and automated,
rules-based transactional decision making.
Applications with functionality required to
support collaboration, scenario evaluation,
risk management, and decision capture
and retention
Operational Intelligence Stack
Decision Support
& Automation Interface
Analytics &
Discovery
Data Organization
& Management
Data Sources
The foundation of the stack includes all current
and potential data sources
Refers to software that processes and prepares
all types of data for analysis. This layer extracts,
cleanses, normalizes, tags, and integrates data.
This layer includes software for ad-hoc
discovery, and deep analytics and software that
supports real-time analysis and automated,
rules-based transactional decision making.
Applications with functionality required to
support collaboration, scenario evaluation,
risk management, and decision capture
and retention
Operational Intelligence Stack
Decision Support
& Automation Interface
Analytics &
Discovery
Data Organization
& Management
Data Sources
The foundation of the stack includes all current
and potential data sources
Refers to software that processes and prepares
all types of data for analysis. This layer extracts,
cleanses, normalizes, tags, and integrates data.
This layer includes software for ad-hoc
discovery, and deep analytics and software that
supports real-time analysis and automated,
rules-based transactional decision making.
Applications with functionality required to
support collaboration, scenario evaluation,
risk management, and decision capture
and retention
Time Factor
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 28
 Time is a key issue
 Downtime of mission critical
applications
 Delayed identification and
notification of breaches
 Poor citizen services.
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 29
 Security, Compliance, and Fraud
 Government is a prime target
Source: http://hackmageddon.com/
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 30
 Security, Compliance, and Fraud
 Government is a prime target
 Ability to detect and to respond
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 31
 Security, Compliance, and Fraud
 Government is a prime target
 Ability to detect and to respond
 Example – State Department
and the White House
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 32
 Security, Compliance, and Fraud
 IT Operations
 Use of Multiple Systems
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 33
 Security, Compliance, and Fraud
 IT Operations
 Use of Multiple Systems
 Understand Activities On and
The Health of The Network
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 34
 Security, Compliance, and Fraud
 IT Operations
 Use of Multiple Systems
 Understand Activities On The
Network
 Improve Efficiency And
Effectiveness
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 35
 Security, Compliance, and Fraud
 IT Operations
 Use of Multiple Systems
 Understand Activities On The
Network
 Improve Efficiency And
Effectiveness
 Example: Healthcare.gov
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 36
 Security, Compliance, and Fraud
 IT Operations
 Industrial Data And IoT
 Sensors everywhere
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 37
 Security, Compliance, and Fraud
 IT Operations
 Industrial Data And IoT
 Sensors everywhere
 Different types of sensors
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 38
 Security, Compliance, and Fraud
 IT Operations
 Industrial Data And IoT
 Sensors everywhere
 Different types of sensors
 Washington DC Example
Use Cases For Operational Intelligence
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 39
 Security, Compliance, and Fraud
 IT Operations
 Industrial Data And IoT
 Sensors everywhere
 Different types of sensors
 Washington DC Example
 Southern Border Example
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 40
Where We Came From
Falling Off The Tech
Cliff
Reestablishing A
Foundation
Going Forward
Image used under a Creative Commons Attribution License from Flickr at
https://www.flickr.com/photos/klengel/16916875917/
Moving Forward
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 41
 The Future Role of the CIO
Data
Responsibility for
data generation
and management
as CTO takes
technology role
Information
Being able to take
data and clarify
what it means
within that context
Intelligence
Deep knowledge
that leads to
actions both now
and about the
future
Knowledge
Taking data and
information within
that specific
context and within
the larger
organizational
and external
context
Technology
Primarily
responsible for
management of
hardware and
software – nuts
and bolts
Changing Role Of The CIO
Moving Forward
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 43
 The Future Role of the CIO
 Having The Right Tools
Thank You
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 44
Join me and your peers and the conversations in
our IDC Government Insights Community
http://idc-insights-community.com/government
Alan Webber
Research Director, Digital Government Innovation and Transformation
IDC Government Insights
awebber@idc.com
@alanwebber
Questions
© IDC Visit us at IDC.com and follow us on 45
Thank You

Contenu connexe

Tendances

Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and SecurityEMC
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017Ray Bugg
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
2018 Big Data Trends: Liberate, Integrate, and Trust Your DataPrecisely
 
Data set The Future of Big Data
Data set The Future of Big DataData set The Future of Big Data
Data set The Future of Big DataData-Set
 
Module 6 The Future of Big and Smart Data- Online
Module 6 The Future of Big and Smart Data- Online Module 6 The Future of Big and Smart Data- Online
Module 6 The Future of Big and Smart Data- Online caniceconsulting
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsRamakant Gawande
 
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...Edureka!
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
 
Battle the Dark Side of Data Governance
Battle the Dark Side of Data GovernanceBattle the Dark Side of Data Governance
Battle the Dark Side of Data GovernanceDATAVERSITY
 
The future of big data analytics
The future of big data analyticsThe future of big data analytics
The future of big data analyticsAhmed Banafa
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data AnalyticsEMC
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 
Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)Yaman Hajja, Ph.D.
 

Tendances (20)

Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and Security
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Big data Analytics
Big data Analytics Big data Analytics
Big data Analytics
 
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
2018 Big Data Trends: Liberate, Integrate, and Trust Your Data
 
Data set The Future of Big Data
Data set The Future of Big DataData set The Future of Big Data
Data set The Future of Big Data
 
Module 6 The Future of Big and Smart Data- Online
Module 6 The Future of Big and Smart Data- Online Module 6 The Future of Big and Smart Data- Online
Module 6 The Future of Big and Smart Data- Online
 
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of thingsBig Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
Big Data & Future - Big Data, Analytics, Cloud, SDN, Internet of things
 
IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012IBM Big Data Platform Nov 2012
IBM Big Data Platform Nov 2012
 
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
Big Data Tutorial For Beginners | What Is Big Data | Big Data Tutorial | Hado...
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
Battle the Dark Side of Data Governance
Battle the Dark Side of Data GovernanceBattle the Dark Side of Data Governance
Battle the Dark Side of Data Governance
 
The future of big data analytics
The future of big data analyticsThe future of big data analytics
The future of big data analytics
 
Analytics3.0 e book
Analytics3.0 e bookAnalytics3.0 e book
Analytics3.0 e book
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Big Data
Big DataBig Data
Big Data
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)Big Data & Analytics (Conceptual and Practical Introduction)
Big Data & Analytics (Conceptual and Practical Introduction)
 

Similaire à Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights

Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayHow often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayAWS Germany
 
Thomas Vavra | New Ways of Handling Old Data
Thomas Vavra | New Ways of Handling Old DataThomas Vavra | New Ways of Handling Old Data
Thomas Vavra | New Ways of Handling Old Datasemanticsconference
 
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...DATAVERSITY
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyDenodo
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
Ibm big data-platform
Ibm big data-platformIbm big data-platform
Ibm big data-platformIBM Sverige
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonIBM Danmark
 
In real-time: new key success factors
In real-time: new key success factorsIn real-time: new key success factors
In real-time: new key success factorsIDC Italy
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl
 
Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.saranya270513
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET Journal
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 

Similaire à Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights (20)

Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayHow often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
 
Thomas Vavra | New Ways of Handling Old Data
Thomas Vavra | New Ways of Handling Old DataThomas Vavra | New Ways of Handling Old Data
Thomas Vavra | New Ways of Handling Old Data
 
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data Strategy
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Ibm big data-platform
Ibm big data-platformIbm big data-platform
Ibm big data-platform
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
In real-time: new key success factors
In real-time: new key success factorsIn real-time: new key success factors
In real-time: new key success factors
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
 
Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 

Plus de Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability SessionSplunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - KeynoteSplunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform SessionSplunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 

Plus de Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Dernier

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 

Dernier (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 

Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights

  • 1. Copyright © 2014 Splunk Inc. Virtual Gov Day Bert Hayes Solutions Engineer Splunk
  • 2. Agenda 1:00pm – Welcome & Keynote Presentation Bert Hayes, Splunk Alan Webber, IDC Government Insights 2:00pm – Splunk for Government: Customer Use Cases Splunk Overview: Bert Hayes, Splunk Security Use Case: Chris Letterman, State of Alaska Business Analytics Use Case: Justin Boucher, DoD Healthcare 3:00pm – Concurrent Breakout Sessions Splunk for Security Glenn Keavney, Deloitte Bert Hayes, Splunk Splunk for IT Operations Jennifer Green, Los Alamos National Security, LLC. Jon Rooney, Splunk Splunk for Application Delivery Calvin Smith, Northrop Grumman Information Systems Jon Thompson, Splunk 2
  • 3. Finding Balance And Security In A Big Data World Alan Webber Research Director Government Insights
  • 4. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 4 Data Has Been Around For A Long Time  Bronze Age – Used Cuneiform to record laws and transactions (Hammurabi Code)
  • 5. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 5 Data Has Been Around For A Long Time  Bronze Age – Used Cuneiform to record laws and transactions (Hammurabi Code)  Paper records
  • 6. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 6 Data Has Been Around For A Long Time  Bronze Age – Used Cuneiform to record laws and transactions (Hammurabi Code)  Paper records  Electronic records and now big data
  • 7. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 7 Where We Came From Falling Off The Tech Cliff Reestablishing A Foundation Going Forward
  • 8. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 8 Where We Came From  Paper Records
  • 9. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 9 Where We Came From  Paper Records  Machine Based Records
  • 10. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 10 Where We Came From  Paper Records  Machine Based Records  PC and Computer Era
  • 11. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 11 Where We Came From  Paper Records  Machine Based Records  PC and Computer Era  Still Very Mixed
  • 12. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 12 Where We Came From Falling Off The Tech Cliff Reestablishing A Foundation Going Forward
  • 13. 1st Platform – Mainframe And Terminals 13  Switching from paper to electrons  Still large question about efficiency and effectiveness of electronic business processes  However paper doesn’t go away  Establishment of the role of the CIO
  • 14. 2nd Platform – LAN/Internet And Client- Server 14  Institutionalization of networks and the introduction of the Internet in work processes  Client-Servers began the exponential growth curve in data  Beginning of enterprise transformation
  • 15. 3rd Platform – Taking Advantage Of Connectedness 15  Citizen/consumer transformation pushes enterprise transformation  New platforms  New engagement models for Government  New decision makers  Government continues focus on operational efficiency  New Government focus on • Outcomes versus outputs • Innovation
  • 16. Innovation Accelerators Driving Disruption And More Change 16  Innovation accelerators will accelerate the rate of change in enterprises  All of these will affect government, though IoT, Cognitive Systems, and Next Gen Security will be the big ones
  • 17. CIO’s Are Being Overwhelmed With Data © IDC Visit us at IDC.com and follow us on Twitter: @IDC 17  CIO’s are often unprepared
  • 18. CIO’s Are Being Overwhelmed With Data © IDC Visit us at IDC.com and follow us on Twitter: @IDC 18  CIO’s are often unprepared.  Multiple types of records  Paper  Digital  Machine data
  • 19. Source: IDC Global Technology and Industry Research Organization IT Survey, May 2013 N= 182 Q. What type of data are being captured and analyzed in your organization? Data, Data Everywhere  Sources – Internal v. External  Type – Structured v. Unstructured  Issues  Quality  Security
  • 20. Government Data Does Not Support Optimal Decisionmaking 20 To what extent do you agree with the following characteristics of the data available in your organization ? (Respondents Selecting “Agree” or Completely Agree”) N = 98 Source: IDC's 2013 BIG Data Survey - March 2014 0 10 20 30 40 50 60 70 80 Secure Actionable Timely Trusted Clean Complete Granular (%)
  • 21. CIO’s Are Being Overwhelmed With Data © IDC Visit us at IDC.com and follow us on Twitter: @IDC 21  CIO’s are often unprepared and lack necessary resources  Multiple types of records  Paper  Digital  Machine data  Trend will only continue and will grow
  • 22. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 22 Where We Came From Falling Off The Tech Cliff Reestablishing A Foundation Going Forward Image used under a Creative Commons Attribution License from Flickr at https://www.flickr.com/photos/grongar/4483840743/
  • 23. Operational Intelligence is a type of real-time and dynamic business analytics that is designed to deliver visibility and insight into streaming data, events, and business operations allowing CIO’s and other executives to make decisions and speed actions based upon real- time insights and intelligence. Operational Intelligence Definition
  • 24. Operational Intelligence Stack Decision Support & Automation Interface Analytics & Discovery Data Organization & Management Data Sources The foundation of the stack includes all current and potential data sources Refers to software that processes and prepares all types of data for analysis. This layer extracts, cleanses, normalizes, tags, and integrates data. This layer includes software for ad-hoc discovery, and deep analytics and software that supports real-time analysis and automated, rules-based transactional decision making. Applications with functionality required to support collaboration, scenario evaluation, risk management, and decision capture and retention
  • 25. Operational Intelligence Stack Decision Support & Automation Interface Analytics & Discovery Data Organization & Management Data Sources The foundation of the stack includes all current and potential data sources Refers to software that processes and prepares all types of data for analysis. This layer extracts, cleanses, normalizes, tags, and integrates data. This layer includes software for ad-hoc discovery, and deep analytics and software that supports real-time analysis and automated, rules-based transactional decision making. Applications with functionality required to support collaboration, scenario evaluation, risk management, and decision capture and retention
  • 26. Operational Intelligence Stack Decision Support & Automation Interface Analytics & Discovery Data Organization & Management Data Sources The foundation of the stack includes all current and potential data sources Refers to software that processes and prepares all types of data for analysis. This layer extracts, cleanses, normalizes, tags, and integrates data. This layer includes software for ad-hoc discovery, and deep analytics and software that supports real-time analysis and automated, rules-based transactional decision making. Applications with functionality required to support collaboration, scenario evaluation, risk management, and decision capture and retention
  • 27. Operational Intelligence Stack Decision Support & Automation Interface Analytics & Discovery Data Organization & Management Data Sources The foundation of the stack includes all current and potential data sources Refers to software that processes and prepares all types of data for analysis. This layer extracts, cleanses, normalizes, tags, and integrates data. This layer includes software for ad-hoc discovery, and deep analytics and software that supports real-time analysis and automated, rules-based transactional decision making. Applications with functionality required to support collaboration, scenario evaluation, risk management, and decision capture and retention
  • 28. Time Factor © IDC Visit us at IDC.com and follow us on Twitter: @IDC 28  Time is a key issue  Downtime of mission critical applications  Delayed identification and notification of breaches  Poor citizen services.
  • 29. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 29  Security, Compliance, and Fraud  Government is a prime target Source: http://hackmageddon.com/
  • 30. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 30  Security, Compliance, and Fraud  Government is a prime target  Ability to detect and to respond
  • 31. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 31  Security, Compliance, and Fraud  Government is a prime target  Ability to detect and to respond  Example – State Department and the White House
  • 32. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 32  Security, Compliance, and Fraud  IT Operations  Use of Multiple Systems
  • 33. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 33  Security, Compliance, and Fraud  IT Operations  Use of Multiple Systems  Understand Activities On and The Health of The Network
  • 34. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 34  Security, Compliance, and Fraud  IT Operations  Use of Multiple Systems  Understand Activities On The Network  Improve Efficiency And Effectiveness
  • 35. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 35  Security, Compliance, and Fraud  IT Operations  Use of Multiple Systems  Understand Activities On The Network  Improve Efficiency And Effectiveness  Example: Healthcare.gov
  • 36. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 36  Security, Compliance, and Fraud  IT Operations  Industrial Data And IoT  Sensors everywhere
  • 37. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 37  Security, Compliance, and Fraud  IT Operations  Industrial Data And IoT  Sensors everywhere  Different types of sensors
  • 38. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 38  Security, Compliance, and Fraud  IT Operations  Industrial Data And IoT  Sensors everywhere  Different types of sensors  Washington DC Example
  • 39. Use Cases For Operational Intelligence © IDC Visit us at IDC.com and follow us on Twitter: @IDC 39  Security, Compliance, and Fraud  IT Operations  Industrial Data And IoT  Sensors everywhere  Different types of sensors  Washington DC Example  Southern Border Example
  • 40. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 40 Where We Came From Falling Off The Tech Cliff Reestablishing A Foundation Going Forward Image used under a Creative Commons Attribution License from Flickr at https://www.flickr.com/photos/klengel/16916875917/
  • 41. Moving Forward © IDC Visit us at IDC.com and follow us on Twitter: @IDC 41  The Future Role of the CIO
  • 42. Data Responsibility for data generation and management as CTO takes technology role Information Being able to take data and clarify what it means within that context Intelligence Deep knowledge that leads to actions both now and about the future Knowledge Taking data and information within that specific context and within the larger organizational and external context Technology Primarily responsible for management of hardware and software – nuts and bolts Changing Role Of The CIO
  • 43. Moving Forward © IDC Visit us at IDC.com and follow us on Twitter: @IDC 43  The Future Role of the CIO  Having The Right Tools
  • 44. Thank You © IDC Visit us at IDC.com and follow us on Twitter: @IDC 44 Join me and your peers and the conversations in our IDC Government Insights Community http://idc-insights-community.com/government Alan Webber Research Director, Digital Government Innovation and Transformation IDC Government Insights awebber@idc.com @alanwebber
  • 45. Questions © IDC Visit us at IDC.com and follow us on 45

Notes de l'éditeur

  1. Glenn – can you please update your title and add anyone else presenting with you?
  2. Title of Presentation Client
  3. Title of Presentation Client
  4. Title of Presentation Client
  5. Title of Presentation Client